Tag Archives: Anti-Virus

The latest updates from the GFI Cloud team

CloudRemoteAdministration_SQElad Schreiber, Product Manager for GFI Cloud, talks about the latest release and the addition of remote administration tools to the Monitoring feature.

Q: Tell us about the latest GFI Cloud release?

This release sees further enhancements to GFI Cloud’s Monitoring service with the introduction of a set of remote administration tools.  Command Line, Process Manager and PowerShell command line will be familiar tools for most of our customers, and by incorporating these into the GFI Cloud platform they will now be able to use these tools remotely, from the same online console as the rest of their GFI Cloud services. Continue reading

BCW#419: 10 Tips To Keep Your Network Safe -Understanding IT Threats – Protecting Your Data

The Business Computing Weekly Podcast Episode # 419

This episode, the focus of the podcast turns to keeping your network safe and protecting your data. The following are discussed.

1. Hackers Vs. Crackers. Threats come from many sources including your employees
2: Be careful of movie devices, and BYOD (Bring your Own Devices).
3. The ongoing battle of Zero Day attacks
4. 95.6% of mobile devices users put company data at risk by using public wifi
5. Reasons to develop a layered security approach
6 Crackers are taking advantage of social networks
7. The responsibility that comes with large amounts of storage
8. Keeping patch management front and center in your policies
9. Thoughts about “Shoulder Surfing”
10. 32% of IT Admins do not test their backup solutions
11. When employees of rogue. Stealth technologies in the workplace.

Links:

GFI Backup Survey
Content Filtering
Patch Management
Securing End Points

 

Strategies for boosting your practice’s information immunity

Introduction

Every day, viruses – along with worms, spyware, Trojans, bots, rootkits and other malicious intruders – infect millions of computers and shut down businesses large and small all over the world. Medical practices are not immune to these threats and their ensuing data breaches.

Rich repositories of personal, clinical and financial data, combined with relatively modest information management capabilities, make medical practices prime candidates for numerous cyber threats, from hacking to computer viruses. These threats will likely be more widespread as practice management systems increase in sophistication, patient information becomes more connected through electronic health records and health information exchanges and health data became more accessible as practices increase their use of tablets, smartphones and other mobile devices.
Continue reading

Why Cloud-based IT Management Is “It” for IT

The big trend in IT from the do-Cloud-based-IT-Management2-300x205it-yourself business owner to the enterprise is cloud-based IT management. It’s not just because “the cloud” is the big buzzword and no one wants to be left behind. It’s because cloud-based IT management makes sense. It can save you money, save you time, and provide you with access to software that would otherwise be out of reach. Let’s take a look at some of the things that make cloud-based IT management the next big thing for IT teams. Continue reading

The Hidden Security Threat

Although not all stories in the tech press are IP-security-300x225directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my attention.

The researcher had a Herculean task to complete: to scan billions of IP addresses using the few computers he had at his disposal. He obviously needed help but where does one find that level of assistance? The researcher gave this some thought and decided to try and exploit insecure systems connected to the Internet. That surely would help.
Continue reading

Why You Need to Consider Having Layered Security within the Organization

Not everyone understands that managed_security_layered_approach_clip_image002network security isn’t just about one specific issue. As a result, many end up not taking the required action to secure their networks. Some businesses believe that investing in an antivirus solution will cover every base.  Some wouldn’t even go that far as they’d think that a good firewall can prevent anything bad from entering the business network. If only they knew how wrong they are.
Continue reading

Jumpstart: Spam Filtering

We had published an article called ‘13 IT Projects project-7-300x300to Include in Your Plans for 2013’ in which we suggested 13 great IT projects for you to consider; we decided to publish some follow-up articles to help do just that.

Our seventh project suggestion was for spam filtering – here’s what we had to say:

Spam volumes continue to rise, and Outlook’s junk mail filters just are not enough anymore. 2013 can be the year you finally get a handle on spam by implementing spam filtering. Whether you deploy something on-premise or in the cloud, blocking spam, phishing, and malware infected messages before they get to your users is something everyone will appreciate.
Continue reading

GFI MailEssentials® Online Solves the Postini™ Problem

Google sounded the death knell of Postini when itPostini-Logo-1-1 started releasing similar features natively within Google Apps. Now Google has announced the end of Postini. This has presented a very real problem for 26 million Postini users – who can either pay more in the long run and use Google Apps, or move to another service to get what they need and avoiding paying for what they don’t.

While cloud-based email protection has brought many advantages to business, migrating from one provider to another can pose challenges. The Google product forums about the difference in services offered by Google may well be cause for concern for current customers.
Continue reading